11881 |
2023-06-29 09:49
|
File_pass1234.7z e276af9bc3421b6131dc5ae635e98123 Redline Escalate priviledges PWS KeyLogger AntiDebug AntiVM RedLine Malware download Amadey Malware suspicious privilege Malicious Traffic Check memory Checks debugger Creates executable files unpack itself IP Check PrivateLoader Tofsee Fabookie Stealer Windows Trojan DNS Downloader |
27
http://94.142.138.131/api/firegate.php - rule_id: 32650 http://45.9.74.6/2.exe - rule_id: 34108 http://hugersi.com/dl/6523.exe - rule_id: 32660 http://zzz.fhauiehgha.com/m/okka25.exe - rule_id: 34705 http://45.15.156.229/api/tracemap.php - rule_id: 33783 http://aa.imgjeoogbb.com/check/?sid=210562&key=5227fd466f380e354858165319182c99 - rule_id: 34651 http://83.97.73.134/gallery/photo085.exe - rule_id: 34603 http://apps.identrust.com/roots/dstrootcax3.p7c http://94.142.138.131/api/tracemap.php - rule_id: 28311 http://77.91.68.30/fuzz/enter.exe http://www.maxmind.com/geoip/v2.1/city/me http://208.67.104.60/api/tracemap.php - rule_id: 28876 http://77.91.68.63/doma/net/index.php - rule_id: 34361 http://us.imgjeoigaa.com/sts/imagc.jpg - rule_id: 33482 http://194.169.175.132:3002/ - rule_id: 34588 http://aa.imgjeoogbb.com/check/safe - rule_id: 34652 https://traffic-to.site/294/setup294.exe - rule_id: 34662 https://db-ip.com/demo/home.php?s=175.208.134.152 https://sun6-22.userapi.com/c909618/u808950829/docs/d60/ae911c61a5dd/3.bmp?extra=F2b9KK27JpNtvBMC1Y4yaeVn55GajWT6ciGj7uK36P0TiSSHZYJttEnVZ7xiAehKEXj_62ejLS8U620U5C6HvQBD2g1TRCh8y4HgaC8ufeTVNhlHShxa-wiNuI7TnC-rQhAKOOT_JiQCWPewSw https://db-ip.com/ https://sun6-23.userapi.com/c909518/u808950829/docs/d20/61b6f7cfa51a/WWW1.bmp?extra=ljjMJ3TZ6hB8z3zwpU99CbXdGMsJI37sAXQrCBdep_p8xUGOtNMgqpIxMsmiJLj5QoskckZTqv7df5SHMp18fg6UihbFQ_501LVeEZnkMxFXFdlVvN33LhTs5MPpa_6q5C2eczyDM2RpNwcblg https://vk.com/doc808950829_663517352?hash=r3SKbalnpLNEHhXDkdRZoDypstvcuZiLfoTMrICifxw&dl=ZGd5edeCxcDIPFuau0XPrh3wmYQ6Se1iGNYMxGiLZ7s&api=1&no_preview=1#3 https://sun6-20.userapi.com/c909228/u808950829/docs/d39/fe32b742760a/PMmp.bmp?extra=VZzlNMvHOBAlFaKT3PjM7fzi2fO1PPHeyMDNPJJo2rbXe1_0xuj-7wPnu8H3ebUInclJGriwMal7va3N5ZM4ubwgDbdcETztEzEEiU7RebYw6sd84k5eBF3RcG0YctzIckqf5x0ELarzyLZzpA https://sun6-22.userapi.com/c909618/u808950829/docs/d28/48cb46c7a63f/ccloudcosmic.bmp?extra=VkJXQrROemTjw_2DoflDwZ9uMItbxt08ym2ypZRJ-FEjXT6xVFsep1emHxpmTxD4d8Kf4aFroEJxtjEtCqrZ60heNUjAFOlBWzL0XkFfhKvGr_dq1jEIvny9lih3e5-zcBxHiNCuXY0Vxut44Q https://vk.com/doc808950829_663496587?hash=9HBIzrbBWHKqUnGhHt30dMcZIm1RpmRRZBzZ89JCfGw&dl=JRIT3v6zzNFrou8UYI02dSfdibpUzCLo9YvFXREFvCT&api=1&no_preview=1 https://sun6-20.userapi.com/c909228/u808950829/docs/d4/71e0c58f306b/RisePro_0_1_vgWJ8smB7NzPfuCfGTFK.bmp?extra=3Cg4yg-UpwzvuMvyrsIV03aSiTNLuwpyXiQT_Udm1BGJA0p9ZRy5fvES7sfolN431f_g90Lc-IHZBjwztx12khk9WtEWW_Lo3NhiK_80hG9HT27oqTryvNR9wdf2Ift-OtK49pdROiLxh9bogw https://api.db-ip.com/v2/p31e4d59ee6ad1a0b5cc80695a873e43a8fbca06/self
|
50
callusoyasociados.com.ar(131.255.7.10) - malware www.maxmind.com(104.17.214.67) db-ip.com(104.26.5.15) api.myip.com(172.67.75.163) hugersi.com(91.215.85.147) - malware sun6-22.userapi.com(95.142.206.2) zzz.fhauiehgha.com(156.236.72.121) - mailcious traffic-to.site(104.21.29.16) - malware ipinfo.io(34.117.59.81) aa.imgjeoogbb.com(154.221.26.108) - mailcious us.imgjeoigaa.com(103.100.211.218) - mailcious sun6-23.userapi.com(95.142.206.3) sun6-20.userapi.com(95.142.206.0) - mailcious vk.com(87.240.132.78) - mailcious api.db-ip.com(104.26.4.15) 194.169.175.128 - mailcious 146.59.161.7 95.142.206.2 104.17.215.67 91.215.85.147 - malware 94.142.138.113 - mailcious 208.67.104.60 - mailcious 176.123.9.85 - mailcious 172.67.75.166 77.91.68.30 - malware 154.221.26.108 - mailcious 157.254.164.98 - mailcious 34.117.59.81 87.240.137.164 - mailcious 104.26.8.59 194.169.175.132 - mailcious 77.91.68.63 - malware 45.12.253.74 - malware 94.142.138.131 - mailcious 185.81.68.115 - mailcious 83.97.73.131 - malware 83.97.73.134 - malware 156.236.72.121 - mailcious 45.15.156.229 - mailcious 104.26.4.15 83.97.73.129 - mailcious 95.142.206.3 163.123.143.4 - mailcious 95.142.206.0 - mailcious 121.254.136.27 45.9.74.6 - malware 176.113.115.239 - malware 172.67.171.62 103.100.211.218 - malware 131.255.7.10 - mailcious
|
23
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) SURICATA Applayer Mismatch protocol both directions ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) ET INFO Observed External IP Lookup Domain in TLS SNI (api .myip .com) ET MALWARE Win32/BeamWinHTTP CnC Activity M2 (GET) ET POLICY PE EXE or DLL Windows file download HTTP ET INFO Executable Download from dotted-quad Host ET MALWARE Single char EXE direct download likely trojan (multiple families) ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response ET INFO TLS Handshake Failure ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging) ET INFO EXE - Served Attached HTTP ET DROP Spamhaus DROP Listed Traffic Inbound group 40 ET MALWARE RedLine Stealer TCP CnC net.tcp Init ET MALWARE Amadey CnC Check-In ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M1 ET MALWARE Win32/Amadey Bot Activity (POST) M2 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download ET MALWARE Win32/Fabookie.ek CnC Request M4 (GET) ET MALWARE Redline Stealer TCP CnC Activity ET MALWARE Redline Stealer TCP CnC - Id1Response ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
|
14
http://94.142.138.131/api/firegate.php http://45.9.74.6/2.exe http://hugersi.com/dl/6523.exe http://zzz.fhauiehgha.com/m/okka25.exe http://45.15.156.229/api/tracemap.php http://aa.imgjeoogbb.com/check/ http://83.97.73.134/gallery/photo085.exe http://94.142.138.131/api/tracemap.php http://208.67.104.60/api/tracemap.php http://77.91.68.63/doma/net/index.php http://us.imgjeoigaa.com/sts/imagc.jpg http://194.169.175.132:3002/ http://aa.imgjeoogbb.com/check/safe https://traffic-to.site/294/setup294.exe
|
6.2 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11882 |
2023-06-29 09:42
|
Setup.exe cde3f3bde3a3a82bb4999ce1f4b81d14 Generic Malware UPX Malicious Packer Antivirus AntiDebug AntiVM OS Processor Check PE32 PE File VirusTotal Malware powershell suspicious privilege Code Injection Check memory Checks debugger WMI Creates shortcut unpack itself powershell.exe wrote Check virtual network interfaces suspicious process AntiVM_Disk VM Disk Size Check Windows ComputerName DNS Cryptographic key |
|
1
|
|
|
9.8 |
|
28 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11883 |
2023-06-29 09:31
|
paste.txt.ps1 4251821c615e5ea7f3f9aa43adbda460 Generic Malware Antivirus VirusTotal Malware Check memory unpack itself WriteConsoleW Windows Cryptographic key |
|
|
|
|
1.6 |
M |
13 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11884 |
2023-06-29 08:03
|
2esHVNjmytPH05O.exe 5cb31213e34b960dd22125d5881d783b Generic Malware .NET framework(MSIL) Antivirus SMTP KeyLogger AntiDebug AntiVM .NET EXE PE32 PE File Browser Info Stealer FTP Client Info Stealer VirusTotal Email Client Info Stealer Malware PDB suspicious privilege Code Injection Check memory Checks debugger buffers extracted Creates shortcut unpack itself Windows utilities Check virtual network interfaces suspicious process WriteConsoleW IP Check Tofsee Windows Browser Email ComputerName Cryptographic key Software crashed |
1
|
4
valerehandstand.com(66.29.132.105) api.ipify.org(104.237.62.211) 66.29.132.105 64.185.227.155
|
3
SURICATA Applayer Detect protocol only one direction ET INFO TLS Handshake Failure SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
15.6 |
|
32 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11885 |
2023-06-29 07:48
|
u3jHBdYzXMviLak.exe 1fcbbe11c8004a763d0ea4944b92444b Gen1 UPX Malicious Library Malicious Packer Anti_VM PDF OS Processor Check PE64 PE File DLL ZIP Format VirusTotal Malware Check memory Creates executable files crashed |
|
|
|
|
2.0 |
M |
13 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11886 |
2023-06-29 07:47
|
Rgss.exe 899eacd4bbe1ad8d2503a9aba92c685a NSIS UPX Malicious Library PE32 PE File DLL VirusTotal Malware Check memory Creates executable files unpack itself AppData folder anti-virtualization Tofsee Discord DNS crashed |
|
2
cdn.discordapp.com(162.159.135.233) - malware 162.159.133.233 - malware
|
3
ET INFO Observed Discord Domain in DNS Lookup (discordapp .com) ET INFO Observed Discord Domain (discordapp .com in TLS SNI) SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
4.0 |
M |
41 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11887 |
2023-06-29 07:45
|
defounderzx.exe 25a6280b20b14dc747c700a1a91cb51b Generic Malware .NET framework(MSIL) Antivirus .NET EXE PE32 PE File VirusTotal Malware powershell suspicious privilege Code Injection Check memory Checks debugger Creates shortcut unpack itself powershell.exe wrote suspicious process WriteConsoleW Windows ComputerName Cryptographic key |
|
|
|
|
7.8 |
M |
50 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11888 |
2023-06-29 07:45
|
owenzx.exe d14a91aa57d07c025c41acacb012c819 Formbook .NET framework(MSIL) PWS AntiDebug AntiVM .NET EXE PE32 PE File FormBook Malware download VirusTotal Malware PDB suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself |
1
http://www.ohrana-truda-truda-rf.online/ge83/?pPX=2nm9SBzFpAsGMwKaX6GJHPtsi8QD7hmQKbLOqqduPt9dPD3Sph+kutYOcJDygkW/3BYE0dDT&1bj=jlNDpj_pi
|
3
www.ohrana-truda-truda-rf.online(172.67.144.112) www.thepresaleplug.com() 172.67.144.112 - mailcious
|
1
ET MALWARE FormBook CnC Checkin (GET)
|
|
8.4 |
M |
36 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11889 |
2023-06-29 07:43
|
pmexzx.exe 9e075f19632321f1b9bd8e08c97ccc3c Formbook .NET framework(MSIL) PWS SMTP KeyLogger AntiDebug AntiVM .NET EXE PE32 PE File Browser Info Stealer FTP Client Info Stealer VirusTotal Email Client Info Stealer Malware PDB suspicious privilege Code Injection Check memory Checks debugger buffers extracted unpack itself Check virtual network interfaces IP Check Tofsee Windows Browser Email ComputerName Cryptographic key Software crashed keylogger |
1
|
2
api.ipify.org(173.231.16.76) 173.231.16.76
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
13.2 |
M |
33 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11890 |
2023-06-29 07:42
|
TopSofts.Setup.exe 7b6479306a1bb71a9fb4413e295bf683 RedLine stealer UPX Malicious Library AntiDebug AntiVM OS Processor Check PE32 PE File VirusTotal Malware Buffer PE PDB Code Injection Check memory Checks debugger buffers extracted unpack itself WriteConsoleW Windows DNS Cryptographic key crashed |
|
1
|
|
|
10.0 |
M |
32 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11891 |
2023-06-29 07:41
|
iccu.exe eb43687f6f0fcffa1aa33ac8f39cb3a7 Formbook .NET framework(MSIL) PWS SMTP KeyLogger AntiDebug AntiVM .NET EXE PE32 PE File Browser Info Stealer FTP Client Info Stealer VirusTotal Email Client Info Stealer Malware PDB suspicious privilege Code Injection Check memory Checks debugger buffers extracted unpack itself Check virtual network interfaces IP Check Tofsee Windows Browser Email ComputerName Cryptographic key Software crashed |
1
|
2
api.ipify.org(64.185.227.155) 104.237.62.211
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
11.0 |
|
39 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11892 |
2023-06-29 07:40
|
1Top.exe 51b7849db58928fb6c1f1e2a343cd2f0 UPX .NET framework(MSIL) Confuser .NET OS Processor Check .NET EXE PE32 PE File RedLine Malware download FTP Client Info Stealer VirusTotal Malware suspicious privilege Check memory Checks debugger buffers extracted unpack itself Collect installed applications installed browsers check Stealer Windows Browser ComputerName DNS Cryptographic key Software crashed |
|
1
|
3
ET MALWARE RedLine Stealer TCP CnC net.tcp Init ET MALWARE Redline Stealer TCP CnC Activity ET MALWARE Redline Stealer TCP CnC - Id1Response
|
|
5.8 |
|
47 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11893 |
2023-06-28 17:04
|
data64_2.exe 7b8d33d5c804c878a5e1188890327d20 RedLine stealer UPX Admin Tool (Sysinternals etc ...) AntiDebug AntiVM .NET EXE PE32 PE File Browser Info Stealer RedLine Malware download FTP Client Info Stealer VirusTotal Malware Buffer PE PDB suspicious privilege Code Injection Check memory Checks debugger buffers extracted unpack itself Collect installed applications installed browsers check Stealer Windows Browser ComputerName Remote Code Execution DNS Cryptographic key Software crashed |
|
1
168.119.239.218 - mailcious
|
1
ET MALWARE RedLine Stealer TCP CnC net.tcp Init
|
|
12.8 |
M |
29 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11894 |
2023-06-28 17:02
|
data64_3.exe 799c6629928f0b945662d787d85a60e6 Themida Packer UPX Anti_VM .NET EXE PE32 PE File VirusTotal Malware AutoRuns suspicious privilege Check memory Checks debugger Creates executable files unpack itself Checks Bios Detects VMWare Check virtual network interfaces AppData folder VMware anti-virtualization Tofsee Windows Remote Code Execution Firmware crashed |
2
https://yandex.ru/showcaptcha?cc=1&mt=5D1DFE957BC55C0C13A0F3496A5246409470CAE10665908D60E4A11127CE0D362A7C960D448E46C99B7ABEBB4D8E3860EE257CBD8B65FF3183BBFE46F37D6B73A9571A37E1FAD1D6DCAE864C73D4B795A3EA5DD1D1DC3CCC8B21&retpath=aHR0cHM6Ly95YW5kZXgucnUvPw%2C%2C_0b3d93996162204192850f35a89c2b92&t=2/1687939219/d0911666741300a32b2774f8ed789ccd&u=e231e10d-f7415e09-81557e5c-3735fe90&s=63ae957878b231fa7f96e2acf1716d16 https://yandex.ru/
|
2
yandex.ru(5.255.255.70) 5.255.255.70
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
8.6 |
|
29 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11895 |
2023-06-28 17:02
|
dollzx.exe c4df006e39809b6857f3cc9117fa2088 Formbook PWS SMTP KeyLogger AntiDebug AntiVM .NET EXE PE32 PE File Browser Info Stealer FTP Client Info Stealer VirusTotal Email Client Info Stealer Malware PDB suspicious privilege Code Injection Check memory Checks debugger buffers extracted unpack itself Check virtual network interfaces IP Check Windows Browser Email ComputerName Cryptographic key Software crashed keylogger |
|
2
api.ipify.org(173.231.16.76) 64.185.227.155
|
|
|
12.0 |
M |
19 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|